@@ -28,9 +28,70 @@ breaking changes, and mappings for the large list of deprecated functions.
28
28
29
29
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
30
30
31
- ### Changes between 3.0.9 and 3.0.9+quic [30 May 2023]
32
- * Add QUIC API support from BoringSSL
31
+ ### Changes between 3.0.10 and 3.0.10+quic [1 Aug 2023]
32
+
33
+ * Add QUIC API support from BoringSSL
34
+
33
35
*Todd Short*
36
+
37
+ ### Changes between 3.0.9 and 3.0.10 [1 Aug 2023]
38
+
39
+ * Fix excessive time spent checking DH q parameter value.
40
+
41
+ The function DH_check() performs various checks on DH parameters. After
42
+ fixing CVE-2023-3446 it was discovered that a large q parameter value can
43
+ also trigger an overly long computation during some of these checks.
44
+ A correct q value, if present, cannot be larger than the modulus p
45
+ parameter, thus it is unnecessary to perform these checks if q is larger
46
+ than p.
47
+
48
+ If DH_check() is called with such q parameter value,
49
+ DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
50
+ intensive checks are skipped.
51
+
52
+ ([CVE-2023-3817])
53
+
54
+ *Tomáš Mráz*
55
+
56
+ * Fix DH_check() excessive time with over sized modulus.
57
+
58
+ The function DH_check() performs various checks on DH parameters. One of
59
+ those checks confirms that the modulus ("p" parameter) is not too large.
60
+ Trying to use a very large modulus is slow and OpenSSL will not normally use
61
+ a modulus which is over 10,000 bits in length.
62
+
63
+ However the DH_check() function checks numerous aspects of the key or
64
+ parameters that have been supplied. Some of those checks use the supplied
65
+ modulus value even if it has already been found to be too large.
66
+
67
+ A new limit has been added to DH_check of 32,768 bits. Supplying a
68
+ key/parameters with a modulus over this size will simply cause DH_check() to
69
+ fail.
70
+
71
+ ([CVE-2023-3446])
72
+
73
+ *Matt Caswell*
74
+
75
+ * Do not ignore empty associated data entries with AES-SIV.
76
+
77
+ The AES-SIV algorithm allows for authentication of multiple associated
78
+ data entries along with the encryption. To authenticate empty data the
79
+ application has to call `EVP_EncryptUpdate()` (or `EVP_CipherUpdate()`)
80
+ with NULL pointer as the output buffer and 0 as the input buffer length.
81
+ The AES-SIV implementation in OpenSSL just returns success for such call
82
+ instead of performing the associated data authentication operation.
83
+ The empty data thus will not be authenticated. ([CVE-2023-2975])
84
+
85
+ Thanks to Juerg Wullschleger (Google) for discovering the issue.
86
+
87
+ The fix changes the authentication tag value and the ciphertext for
88
+ applications that use empty associated data entries with AES-SIV.
89
+ To decrypt data encrypted with previous versions of OpenSSL the application
90
+ has to skip calls to `EVP_DecryptUpdate()` for empty associated data
91
+ entries.
92
+
93
+ *Tomáš Mráz*
94
+
34
95
### Changes between 3.0.8 and 3.0.9 [30 May 2023]
35
96
36
97
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
@@ -45,7 +106,7 @@ breaking changes, and mappings for the large list of deprecated functions.
45
106
IDENTIFIER to canonical numeric text form if the size of that OBJECT
46
107
IDENTIFIER is 586 bytes or less, and fail otherwise.
47
108
48
- The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT
109
+ The basis for this restriction is [ RFC 2578 (STD 58), section 3.5] . OBJECT
49
110
IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at
50
111
most 128 sub-identifiers, and that the maximum value that each sub-
51
112
identifier may have is 2^32-1 (4294967295 decimal).
@@ -55,8 +116,6 @@ breaking changes, and mappings for the large list of deprecated functions.
55
116
these restrictions may occupy is 32 * 128 / 7, which is approximately 586
56
117
bytes.
57
118
58
- Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
59
-
60
119
*Richard Levitte*
61
120
62
121
* Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which
@@ -19655,6 +19714,10 @@ ndif
19655
19714
19656
19715
<!-- Links -->
19657
19716
19717
+ [CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
19718
+ [CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
19719
+ [CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
19720
+ [RFC 2578 (STD 58), section 3.5]: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
19658
19721
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
19659
19722
[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
19660
19723
[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
0 commit comments